The Underground Librarian

What cats do before meeting curiosity sellers….

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 15 other followers

  • Subscribe

  • Journal & Data Mining

  • Archives

  • Journal Dates

    February 2016
    S M T W T F S
    « Jan    
     123456
    78910111213
    14151617181920
    21222324252627
    2829  
  • RSS Latest Finds

    • Transit and Public Transportation February 3, 2016
        Grants | Department of Transportation https://www.transportation.gov/grants … apply for federal transportation financing programs, … Transportation Safety Grants Public Transit Clean Fuel Grants; Delphi eInvoicing System;   Transportation Grants | FederalGrants.com www.federalgrants.com/Category/Transportation.html Select a specific Transportation grant to […]
      Tespid
    • Grant Op IV February 3, 2016
      The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 1/14/2016. If updates have been made to the opportunity synopsis, update information is provided below the synopsis. If you would like to receive notifications of changes to […]
      Tespid
    • Grants Op III February 3, 2016
      The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 7/2/2015. If updates have been made to the opportunity synopsis, update information is provided below the synopsis. If you would like to receive notifications of changes to […]
      Tespid
    • Grant Op II February 3, 2016
      The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 2/1/2016. If updates have been made to the opportunity synopsis, update information is provided below the synopsis. If you would like to receive notifications of changes to […]
      Tespid
    • Grant Op February 3, 2016
      The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 2/2/2016. If updates have been made to the opportunity synopsis, update information is provided below the synopsis. If you would like to receive notifications of changes to […]
      Tespid
  • Comments

    cell phone spy delet… on Book Recomendation 2014
    cell phone spy app f… on Book Recomendation 2014
    Mobile Credit Card M… on Pa. Journals: “bath…
    Tespid on Black Bean Corn Bread
    Tespid on tNcS III
    Tespid on Repst:Cardinal Jozef Glemp
    http://www.npo-rta.c… on New Haven
    クロックス クロックバンド ミッキー ク… on Cold Porridge: collecting name…
    カシオ ベビーG デジタル on Cold Porridge, Silver Spo…
    big-nose.com on Reference Reading: Fundamental…
  • Blog Stats

    • 8,895 hits
  • Top Clicks

    • None
  • Top Posts

Transit and Public Transportation

Posted by Tespid on February 2, 2016

 

Ada Township has earmarked its $6,287 in federal Community Development block grant funds from Kent County for the year 2016 for its public transportation plan. After a public hearing on Jan. 25, the board voted to allocate all available funds from the …

MLive · ByJan Holst · 1 day ago

Hope Network

More than seven in 10 Americans support increased federal funding for the nation’s public transportation systems in communities of all sizes, according to a survey conducted by ORC International for the American Public Transportation Association.

Stanwood Camano NEWS · 17 hours ago

public transit

A public-private group preparing to apply for a federal grant is proposing an interactive transportation network that would include public transit and possibly innovative traffic communication and automated vehicles. No local matching funds would be …

GSA Business · 10 hours ago
The grantFederal funding for local projects,” said Freeholder Chairman Bruce H. Bergen. “The response from our municipalities was overwhelmingly positive, and we are looking forward to another round of County …

tapinto.net · 3 hours ago
California transit agencies say the U.S. Department of Labor is blocking as much as $1 billion in vital grants unless the agencies agree to violate a state public employee pension reform law. The agencies thought they had won a federal court victory late …

San Jose Mercury News · 8/21/2015

 

Posted in Dallas Area Rapid Transit | Leave a Comment »

Grant Op IV

Posted by Tespid on February 2, 2016

The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 1/14/2016. If updates have been made to the opportunity synopsis, update information is provided below the synopsis.

If you would like to receive notifications of changes to the grant opportunity click send me change notification emails. The only thing you need to provide for this service is your email address. No other information is requested.

Any inconsistency between the original printed document and the disk or electronic document shall be resolved by giving precedence to the printed document.
General Information

Document Type: Grants Notice
Funding Opportunity Number: RUS-16-01-DLT
Funding Opportunity Title: Distance Learning and Telemedicine Grant Program
Opportunity Category: Discretionary
Funding Instrument Type: Grant
Category of Funding Activity: Community Development
Education
Health
Category Explanation:
Expected Number of Awards: 65
CFDA Number(s): 10.855 — Distance Learning and Telemedicine Loans and Grants
Cost Sharing or Matching Requirement: Yes
Posted Date: Jan 14, 2016
Creation Date: Jan 14, 2016
Original Closing Date for Applications: Mar 14, 2016  
Current Closing Date for Applications: Mar 14, 2016  
Archive Date: Apr 13, 2016
Estimated Total Program Funding: $19,000,000
Award Ceiling: $500,000
Award Floor: $50,000

Eligibility

Eligible Applicants:
County governments
Independent school districts
For profit organizations other than small businesses
Small businesses
State governments
Native American tribal governments (Federally recognized)
Nonprofits that do not have a 501(c)(3) status with the IRS, other than institutions of higher education
Nonprofits having a 501(c)(3) status with the IRS, other than institutions of higher education
Native American tribal organizations (other than Federally recognized tribal governments)
Private institutions of higher education
City or township governments
Public and State controlled institutions of higher education
Special district governments
Additional Information on Eligibility:

Additional Information

Agency Name: Utilities Programs
Description: Distance Learning and Telemedicine Grant Program
Link to Additional Information: Program Web Site
Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

Randall Millhiser DLT Coordinator Phone 2027200800
Agency Contact

Posted in grants | Leave a Comment »

Grants Op III

Posted by Tespid on February 2, 2016

The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 7/2/2015. If updates have been made to the opportunity synopsis, update information is provided below the synopsis.

If you would like to receive notifications of changes to the grant opportunity click send me change notification emails. The only thing you need to provide for this service is your email address. No other information is requested.

Any inconsistency between the original printed document and the disk or electronic document shall be resolved by giving precedence to the printed document.
General Information

Document Type: Grants Notice
Funding Opportunity Number: VA-GRANTS-NCA-FY2016
Funding Opportunity Title: Veterans Cemetery Grants
Opportunity Category: Discretionary
Funding Instrument Type: Grant
Category of Funding Activity: Community Development
Category Explanation:
Expected Number of Awards: 20
CFDA Number(s): 64.203 — State Cemetery Grants
Cost Sharing or Matching Requirement: Yes
Posted Date: Jul 2, 2015
Creation Date: Jun 10, 2015
Original Closing Date for Applications: Jul 1, 2016  
Current Closing Date for Applications: Jul 1, 2016  
Archive Date: Jul 31, 2016
Estimated Total Program Funding: $45,000,000
Award Ceiling: $45,000,000
Award Floor: $0

Eligibility

Eligible Applicants:
State governments
Native American tribal governments (Federally recognized)
Additional Information on Eligibility:

Additional Information

Agency Name: VA National Cemetery Administration
Description: Grants are available for states, territories and federally recognized tribal governments. This program is implemented in 38 Code of Federal Regulations Part 39.
Link to Additional Information: Veterans Cemetery Grants website
Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

Veterans Cemetery Grants Program
Veterans Cemetery Grants Program mailbox

Posted in grants | Leave a Comment »

Grant Op II

Posted by Tespid on February 2, 2016

The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 2/1/2016. If updates have been made to the opportunity synopsis, update information is provided below the synopsis.

If you would like to receive notifications of changes to the grant opportunity click send me change notification emails. The only thing you need to provide for this service is your email address. No other information is requested.

Any inconsistency between the original printed document and the disk or electronic document shall be resolved by giving precedence to the printed document.
General Information

Document Type: Grants Notice
Funding Opportunity Number: 16JD01
Funding Opportunity Title: National Sheriffs’ Institute Facilitation
Opportunity Category: Discretionary
Funding Instrument Type: Cooperative Agreement
Category of Funding Activity: Other (see text field entitled “Explanation of Other Category of Funding Activity” for clarification)
Category Explanation: National Sheriffs’ Institute Facilitation
Expected Number of Awards: 1
CFDA Number(s): 16.601 — Corrections_Training and Staff Development
Cost Sharing or Matching Requirement: No
Posted Date: Feb 1, 2016
Creation Date: Jan 29, 2016
Original Closing Date for Applications: Mar 1, 2016  
Current Closing Date for Applications: Mar 1, 2016  
Archive Date: Mar 31, 2016
Estimated Total Program Funding:
Award Ceiling: $150,000
Award Floor: $0

Eligibility

Eligible Applicants:
Others (see text field entitled “Additional Information on Eligibility” for clarification)
Additional Information on Eligibility: An eligible applicant is any public or private agency, educational institution, organization, individual or team with expertise in the described areas.

Additional Information

Agency Name: National Institute of Corrections
Description: The National Institute of Corrections (NIC) is soliciting proposals from organizations, groups, or individuals to enter into a cooperative agreement for a 1 year period, with 2 additional option years, to begin at the date of the award. Work under this cooperative agreement will involve facilitation of 2 offerings per year of the week long National Sheriff’s Institute beginning in FY’16. The successful awardee will have the resources to identify and select first term sheriffs, disseminate and collect pre-class assignments and testing, provide instructors for each offering and collect and evaluate participant feedback provided by NSI participants. This project will be a collaborative venture with the NIC Jails Division.
Link to Additional Information:
Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

Melanie Simms Administrative Officer Phone 202-353-0484
Technical

Posted in grants, Uncategorized | Leave a Comment »

Grant Op

Posted by Tespid on February 2, 2016

The synopsis for this grant opportunity is detailed below, following this paragraph. This synopsis contains all of the updates to this document that have been posted as of 2/2/2016. If updates have been made to the opportunity synopsis, update information is provided below the synopsis.

If you would like to receive notifications of changes to the grant opportunity click send me change notification emails. The only thing you need to provide for this service is your email address. No other information is requested.

Any inconsistency between the original printed document and the disk or electronic document shall be resolved by giving precedence to the printed document.
General Information

Document Type: Grants Notice
Funding Opportunity Number: 2016-NIST-SBIR-01
Funding Opportunity Title: FY 2016 Small Business Innovation Research (SBIR) Program
Opportunity Category: Discretionary
Funding Instrument Type: Cooperative Agreement
Category of Funding Activity: Other (see text field entitled “Explanation of Other Category of Funding Activity” for clarification)
Category Explanation: Science, Technology, Business and/or Education Outreach
Expected Number of Awards:
CFDA Number(s): 11.620 — Science, Technology, Business and/or Education Outreach
Cost Sharing or Matching Requirement: No
Posted Date: Feb 2, 2016
Creation Date: Feb 2, 2016
Original Closing Date for Applications: Apr 14, 2016  Phase I electronic applications must be received no later than 11:59 p.m. Eastern Time, April 14, 2016. Paper applications must be received by NIST by 5:00 p.m. Eastern Time, April 14, 2016.
Current Closing Date for Applications: Apr 14, 2016   Phase I electronic applications must be received no later than 11:59 p.m. Eastern Time, April 14, 2016. Paper applications must be received by NIST by 5:00 p.m. Eastern Time, April 14, 2016.
Archive Date: May 14, 2016
Estimated Total Program Funding:
Award Ceiling:
Award Floor:

Eligibility

Eligible Applicants:
Others (see text field entitled “Additional Information on Eligibility” for clarification)
Additional Information on Eligibility: Each applicant for both Phase I and Phase II must qualify as a small business concern for R/R&D purposes, as defined in Section 1.06 of this FFO, at the time of award. In addition, the primary employment of the principal investigator must be with the small business at the time of the award and during the conduct of the proposed research. Primary employment means that more than one-half of the principal investigator’s time is spent working with the small business. Primary employment with a small business precludes full-time employment with another organization. Occasionally, deviations from this requirement may occur, which must be approved in writing by the NIST Grants Officer after consultation with the SBIR Program Manager. Further, a small business may only replace the principal investigator on an SBIR Phase I or Phase II award if the NIST Grants Officer provides prior written approval. Personnel obtained through a Professional Employer Organization or other similar personnel leasing company may be considered employees of the awardee.

Additional Information

Agency Name: National Institute of Standards and Technology
Description: The National Institute of Standards and Technology (NIST) invites small businesses to submit Phase I research applications under this Federal Funding Opportunity (FFO). Firms with strong research capabilities in any of the areas listed in Section 9 of this FFO are encouraged to participate. Applications not addressing one of the subtopics in Section 9 are not responsive to this FFO. The NIST FY 2016 SBIR program identifies and solicits applications in topics that fall within NIST’s mission and allow collaboration between NIST scientists and the SBIR awardees whenever possible. In order to ensure a greater strategic alignment between the SBIR program and NIST’s laboratory research program, the SBIR topics are the priority areas identified in the NIST Programmatic Plan FY 2016-2018 available at: http://www.nist.gov/director/planning/planning.cfm.
Link to Additional Information: 2016-NIST-SBIR-01 Full Announcement/FFO document
Contact Information: If you have difficulty accessing the full announcement electronically, please contact:

Christopher Hunton Management and Program Analyst Phone 301-975-5718
Agency Contact

Posted in grants | Leave a Comment »

Hot Porridge

Posted by Tespid on January 26, 2016

Take this with a gain of salt. Just heard Mexican drug lords are moving to Seattle.

Use the information wisely,

-W.H.Tespid ERT

Posted in Bone | Tagged: | Comments Off on Hot Porridge

The Edge: Nightclub Sentinel I.2016

Posted by Tespid on January 25, 2016

I can not express without grave interest that the club scene saved me from a pool of lonely nights. Picking up the opposite sex was never the point. The point was to dance and to dance my ass off. Good music never hurt that prospect either. Still, as subsequent nights followed on I wondered about safety and reality returned. I may be scrappy, but seriously can I hold my own against a gun? Wandering the city at night in the cold was a sight to behold as well. Neon versus pure unadulterated sunlight. Now that is an essay worth exploring. Below are a few things that caught my eye whether to help one or many. Scavenge what you will. Ignore the remains till later. I’ll be here.
~Adinar Asueno
Power restored in downtown Dallas after underground electrical fire

Dallas Morning News (blog)Nov 4, 2015
This is at least the third fire in the past couple of weeks reported in the underground electrical vaults that dot downtown Dallas. It’s unclear …

The New State of British Nightlife

VICEJan 19, 2016
The unique character of British nightlife was born from two anomalies. … an explosion of super clubs, and beginning a lineage of underground …

Can classical music be cool?

The Economist (blog)Jan 15, 2016
… blend of electronic classical at a range of underground clubs and bars for … objected to her vigorous head movements during a performance.

The Year of Deep House?

Wall Street JournalDec 28, 2015
An underground movement is resurrecting what’s known as deep … Exchange LA and Sound Nightclub are featuring more deep house in their …

Behind the mask: A closer look at Keith Ape and the state of Asian rap

The Stanford DailyJan 14, 2016
… tour with a gig at Venue, a small nightclub in downtown Oakland. … Stuck in the underground of a faltering rap game (“Korean rap, it sucks. … Far East Movement and Chad Hugo, Asian artists are still footnotes in rap history.

New Years warning over ‘killer’ lion ecstasy tablets

The SunDec 30, 2015
… both victims alongside staff and management from Nation nightclub, to establish the full circumstances surrounding the movements of both men that night.” … project including shops, cafes and an underground music venue.
Story image for underground nightclub drug scene from Skiddle.com

Fabio interview: Return of the original ravers

Skiddle.comJan 20, 2016
Mark Dale caught up with Fabio to discuss the early rave scene, his musical … By 1988 clubs were opening that were playing it and things began getting serious … Oh yeah, a massive difference. Drugs. Drugs changed everything. …. I remember playing a night called Rupture, an underground drum n’ bass …

Berlin’s techno club scene draws expats and travellers

Toronto StarDec 31, 2015
Berlin’s vibrant and seemingly never-ending nightlife — and its extremely open attitudes toward sexuality, music, fashion and drugs — provide an intoxicating … But Berliners’ fierce devotion to underground music and an …
Story image for underground nightclub drug scene from The Guardian

Last dance: how London’s after-hours clubbing scene finally faded out

The GuardianOct 12, 2015
At the time, most clubs ended at 2 or 3am and after-hours parties were illicit, even … By then, London’s after-hours scene was in rude health.

Posted in The Nightclub Sentinel | Comments Off on The Edge: Nightclub Sentinel I.2016

Cyber Security I.2016

Posted by Tespid on January 25, 2016

The North American underground – and where hackers like to hide

Source: http://blog.trendmicro.com/the-north-american-underground-and-where-hackers-like-to-hide/

The North American Underground is a hotbed of cyber criminal activity.When we think of the cyber criminal underground, there is one country that immediately comes to mind: Russia. In many ways, Russia is the global capital of cyber crime, thanks to its incredibly powerful underground – a vast network of cyber criminals that has grown over the years. In a series of industry papers, Trend Micro contributor Max Goncharov traced the rise of the Russian cyber underground and the particular circumstances that have given rise to Russia as the locus of malware development worldwide.

In his exhaustively researched papers – including one entitled “Russian Underground 101” – Goncharov detailed the enormous array of threats that are actively being developed in Russia thanks to a carefully calculated and wide-ranging system of collaboration about the nation’s threat actors. While many cyber fraudsters work in isolation, the real strength comes in numbers and big sales, and the members of the Russian underground know this. That is why they have been dedicated not only to developing new strains of ransomware, exploits, trojans, botnets, rootkits, and all other manner of malware, but also to selling these things on the underground market – a place where improvements to various malicious strains are made constantly, meaning that malware is always evolving.

While there is a lot of media attention devoted to the proliferation of cyber crime and the impact it has on every industry out there, there is decidedly less coverage on the way it functions according to a clear business model. With regard to Russia, for instance, the Russian cyber criminal underground is not something that hs gotten significant media attention outside of Goncharov’s reports. It is interesting, then, to compare that lack of attention to the absolute flood of media coverage that accompanied another Russia-specific cyber event: The threat that hackers posed to Sochi visitors during the 2014 Olympic Winter Games.

At the time, it seemed that every media organization present in the city had its own take on the story. At NBC, for instance, Richard Engel provided coverage describing how he was personally hacked within a day of arriving in Moscow. There’s no doubt about why the Sochi stories were so numerous: They were examples of cyber crime in action – and that’s the kind of thing that makes for good headlines. In the midst of this kind of coverage, stories about the inner workings of cyber criminals can become sidelined.

The lack of focus on cyber crime as a business, however, is an oversight that people like Goncharov are seeking to correct. Just like there’s a market for Internet of Things devices, health care technology, and educational software, there’s a market for cyber crime – and that’s what the criminal underground represents. But it’s a mistake to assume that the cyber underground is something that’s unique to Russia – or any other one place for that matter. The global nature of cyber crime, after all, means that hacking underground efforts can crop up wherever organization on a significant scale takes place. And there’s another place where that’s happened: North America.

The North American underground

A recent Trend Micro report by Kyle Wilhoit and Stephen Hilt, members of the Forward-Looking Threat Research (FTR) Team, illustrated how North America has a thriving cyber criminal underground, one that’s grown over the years thanks to the significant level of competition within it. Broadly characterizing the North American underground, Wilhoit and Hilt point out that it’s fundamentally dissimilar from other similar underground options in different regions.

“The North American underground does not rely on limiting access for sustainability. It does not close its doors to novices. On the contrary, it encourages cybercriminal activity,” Wilhoit and Hilt wrote.

So while the Russian underground is cloaked in secrecy and requires a degree of undercover work in order to learn about, the North American underground is a bit more out in the open; some of its services, in fact, are even promoted on platforms like YouTube. The fact that the North American underground has a greater degree of visibility in general makes it ripe for the kind of study that Wilhoit and Hilt produced.

Here are some of the more notable findings to come out of their report:

  • The visibility of the underground has a purpose: The subtitle of the Trend Micro report about the underground is “The Glass Tank,” which aptly describes what the underground is in North America. Instead of a highly secretive arena whose dealings take place in the shadows, the North American underground is mostly an open forum – or as open as an underground operation can be, anyway. But the high degree of visibility within the underground isn’t the result of sloppy organization; instead, it’s a strategic move on the part of its participants to drive up the number of potential customers and ultimately reap bigger products.
  • Just because the underground is often above ground doesn’t mean it’s easy to investigate: One might assume that the more open nature of the underground means authorities will have an easy time bringing its participants to justice. But this isn’t the case. A glass tank, in addition to being transparent, is also fragile. When it comes to the underground, this fragility is manifested in the ephemeral nature of the underground sites. One minute an underground site is available, and the next it’s gone. This state of flux makes it very challenging for authorities to accurately track and map the malicious activity taking place within the sector.
  • Bulletproof hosting services abound: BPHS come into play because cyber criminals need to be able to carry out their criminal work while remaining undetected. In this way, BPHS are an absolute necessity: “BPHS providers allow users to store anything, including malicious content like phishing sites, pornographic materials, and command-and-control (C&C) infrastructure,” Wilhoit and Hilt stated. “As such, many major cybercriminal groups would not be able to operate without the aid of BPHSs with legitimate business fronts that shield them from the prying eyes of law enforcement.” Not surprisingly, within the North American underground, there are a lot of options for BPHSs: “Various BPHS offerings can be found in the North American underground. Custom BPHS tailored to specific needs can be obtained for US$75 per month. This comes with a single Internet Protocol (IP) address and 100GB of hard disk drive (HDD) space on a machine with a 2GB random-access memory (RAM). Note though that basic access to a bulletproof server can also be obtained for as low as US$3 a month.”
  • There are ample opportunities for malware buyers to learn new hacking tips: Some malware developers prefer to remain secretive about their methods, selling their malicious strains but otherwise having no communication with those who are buying them. But this is not the dynamic on display within the North American underground, where, as Wilhoit and Hilt discovered, much of the malware for purchase is accompanied by technical support that comes straight from the developers. This support puts buyers in a better position to do more damage with whatever malicious strain they’re buying.
  • DDoS attacks are being sold for cheap: If you’ve ever wondered why DDoS attacks occur with such frequency, one of the reasons has to do with the price of purchase. According to the Trend Micro report, DDoS packages are now being sold for pretty cheap prices. Wilhoit and Hilt provided examples of DDoS attack service packages that were going for as cheap as $4. With prices like these, it’s not hard for amateurs with little to no malware development experience to carry out attacks of their own. It’s important to keep in mind, after all, that cyber crime is a for-profit venture, and that those at the bottom of the ladder are unskilled individuals whose infractions amount to petty theft.
  • Stolen account credentials also a big issue: Hate having to shell out the $7 or so dollars a month for your Netflix account? Or do you want Hulu Plus without those pesky fees? Cyber criminals cater to these individuals – who also don’t mind committing a crime – by offering them stolen account credentials. The idea behind these is that you pay a small sum for the credentials and then get unfettered access to the compromised individual’s account – provided, however, that the compromised user does not alter his or her password. These days, the going rate for access to a stolen Spotify account is $2. If you want access to a verified PayPal account, however, that will cost you $9, since of course you can do more damage with that kind of access. Of course, you could always settle for a middle ground between these two services by getting illegal access to a Netflix account, the going rate for which is $5.
  • The future of the underground might not be so bright: There’s one key difference between North America and other regions that will work in favor of the good guys: the strength of law enforcement. As Wilhoit and Hilt stated, North America collectively has one of the best and most coordinated law enforcement efforts in the world. And law enforcement isn’t standing around and watching passively as cyber criminals carry out their dirty work. Instead, law enforcement officials in North America are on the forefront of cutting-edge strategic efforts to track and bring down cyber criminals. Just as hacking is evolving, so is policing, and as authorities develop more sophisticated strategies for nabbing hackers, that could spell serious trouble for the North American underground.

Where hackers like to hide

The key element of the cyber underground is its secrecy. Everything happens below the surface, in arenas that are very hard to monitor and trace. The covert nature of cyber criminals within the underground points to the broader issue of cyber criminals succeeding at consistently flying under the radar. These days, hackers are hiding practically everywhere they can, meaning that a threat could be just around the corner for you if you’re not careful.

The underground illustrates how effective hackers can be at organizing in an under-the-radar way. It’s this same silent-but-deadly approach that makes them such a threat to their victims, whether those are organizations or individual computing users. Here are some of the places that hackers like hiding the most:

  • Inside Dropbox accounts: People use Dropbox to easily store significant volumes of personal data. But the service may be playing unwitting host to more than your files, since as Beta News reported, hackers a group of hackers called admin@338 – currently suspected to be tied to the Chinese government – are carrying out malicious attacks whose command center can be tied to Dropbox accounts. The fact that cyber criminals are able to use Dropbox for their malicious purposes should give you an idea of the legitimate service that they are able to stealthily harness for their own criminal ends.
  • On adult websites: It should come as no surprise that hackers love to target pornographic websites. But as Komando’s Justin Ferris pointed out, most of the malicious activity that we typically associate with porn sites happens via efforts that require some action on the part of the individual – i.e. downloading – in order to unleash. Downloads that contain malware are one of the most common malicious types linked to porn sites, but these require decisive action on the part of the computing user – i.e. making the conscious decision to download something. The concern these days, however, is that malvertising is becoming increasingly common on porn sites, and as Ferris stated, this malware type “skips embedding malicious code on a website and instead puts it in the system serving ads to the website.” That can be a problem for visitors to these sites who think that just because they do not download something that means they’re not at risk.

With threats mounting for organizations, the time has arrived to bolster security measures with top-tier protection. After all, the North American underground has a strong presence, and hackers are apt to hide just about anywhere. They’re always lurking waiting to carry out that next attack, which is why it’s imperative for individuals and organizations to drive up their defenses and always operate in a proactive mode. A total user protection package can play a significant role in providing that proactive solution.

Posted in Cyber Security | Comments Off on Cyber Security I.2016

January 2016:Underground Mvmt Survey

Posted by Tespid on January 21, 2016

Story image for underground social movements from eNCA

Jeremy Cronin – My response to Thabo Mbeki

eNCA9 hours ago
In the political underground of the 1970s, and perhaps more into the mid-1980s, … in a movement that could produce such an evidently lucid political intellectual. …. The social democratic tradition was a pale and rather cynical …
Story image for underground social movements from Inverse

Baby Boomers Have Untapped Potential as a Legion of Retired

InverseJan 18, 2016
… is whether the generation that kickstarted the social movements of the … underground radio, esoteric tracts, consciousness-raising teach-ins, …

Islamic State’s Appeal In Malaysia – Analysis

Eurasia Review21 hours ago
At the time, the Al-Arqam movement had the sympathy and respect of many Malays … Most went underground and kept their sympathies to themselves. … and under achieving, become the targets of Islamic State social media.

Can Virtual Sex Prevent Pedophiles from Harming Children in Real

BroadlyJan 14, 2016
With a few points and clicks on each girl’s tiny shape, he could control the child’s movements. … Driven underground and left literally to their own devices, … further isolate pedophiles from more reliable professional and social …
Story image for underground social movements from The Atlantic

ISIS in the World’s Largest Muslim Country

The AtlanticJan 3, 2016
… against it in the 1950s and early 1960s, before moving underground. The militant Islamist movement then split into numerous groups, from Laskar … it’s politically stable, so there’s no social unrest or conflict, and the Muslims …

Detroit podcasts you need to be listening to

Model DJan 11, 2016
… for social work) used to go to the bar after their improv class and talk … Everything eventually ends — relationships, communities, movements, lives. … a show producer at WDET, and an underground newspaper publisher.

The Imperiled Bloggers of Bangladesh

New York TimesDec 29, 2015
They have waged hate campaigns on social media against secular writers … The online movement in Bangladesh started in chat forums in 2001 and … The group was driven underground but long remained a powerful force in …
The price of secularism in Bangladesh
DhakaTribuneDec 30, 2015

Explore in depth (3 more articles)

Why Indonesia is Immune to ISIS

Defense OneJan 3, 2016
… rebellions against it in the 1950s and early 1960s, before moving underground. The militant Islamist movement then split into numerous groups, … it’s politically stable, so there’s no social unrest or conflict, and the Muslims …
Story image for underground social movements from The Real News Network

The Political Prisoners and Prisoners of War Report with Jihad

The Real News NetworkJan 11, 2016
Co-chairperson for the National Jericho Amnesty Movement and former … Party at sixteen and eventually went underground in the ranks of the Black … of children and adult plays for spiritual, social, and political awareness, …

Body Hackers and Bioengineers Are Trying to Make DFW a Hub of

Dallas ObserverJan 5, 2016
(He’s a social worker who asked we not include his last name.) … Dallas is at the center of two movements that are each trying to bring implants to the ….. experimentation emerge from the underground and into his parlor.

Posted in Activism, Bone, Movements | Comments Off on January 2016:Underground Mvmt Survey

Pa. Journals II 2016

Posted by Tespid on January 21, 2016

Story image for underground cocaine trafficking allegheny county pennsylvania from WTAE Pittsburgh

‘Bricks R Us:’ Wide-reaching Western Pa. heroin operation broken up

WTAE PittsburghMay 29, 2014
It’s the biggest drug bust that the DA can remember in Allegheny County, and it’s from a … Called “Bricks R Us,” the drug ring was busted through bold shirts they wore that … Duquesne, Penn Hills, Monroeville, Pittsburgh and the counties of … “They brazenly conducted most of their drug trafficking along the …

Story image for texas pennsylvania drug trafficking from Natural Products INSIDER (blog)

Federal Prosecutors Target Marketers of Drug-Tainted ‘Dietary

Natural Products INSIDER (blog)14 hours ago
Federal Prosecutors Target Marketers of Drug-Tainted ‘Dietary Supplements’ … bars in Texas for trafficking and attempting to traffic in counterfeit versions of a … More recently, Cheryl Floyd of Harrisburg, Pennsylvania was …

California deputy busted with pot in York Co.

York Daily Record/Sunday NewsDec 31, 2015
The three men are scheduled for a preliminary hearing on the drug charges … 122 packages of marijuana from northern California to Pennsylvania. … Earlier this year, Heath traveled to Waco, Texas, to testify in a federal case against a man accused of participating in a family-run marijuana trafficking ring, …
Drug Agent Allegedly Moved 200 lbs of Pot
Officer.com (press release) (registration) (blog)Jan 1, 2016

Explore in depth (3 more articles)

DA commends police for $2 million drug bust

witf.orgJan 5, 2016
29 when police conducted a traffic stop, Kearney said. … Heath admitted to driving the marijuana from California to Pennsylvania, the affidavit states. … Earlier this year, Heath traveled to Waco, Texas, to testify in a federal case …
California Deputy Caught With 250lbs Pounds Of Marijuana
Highly CitedMintpress News (blog)Jan 5, 2016

Explore in depth (27 more articles)

More than 30 nabbed in Northern Tier drug sweep

Elmira Star-GazetteSep 23, 2015
The Mobile Street Crimes Unit was created to visit Pennsylvania municipalities where drug trafficking and related criminal activity are present.

‘Baby Doll’ drug lord busted; Ana Marie Hernandez oversaw Mexico

6abc.comOct 29, 2015
The U.S. Border at El Paso, Texas, is so porous that drug dealers are known … her cocaine trafficking organization supplied dealers in Chicago, …

Texas man arrested in Lancaster on drug charges sentenced to

PennLive.comOct 9, 2015
Texas man arrested in Lancaster on drug charges sentenced to federal prison … 144 months in federal prison for his role in a drug trafficking conspiracy, … the Lancaster Police Department and the Pennsylvania State Police.

Story image for texas pennsylvania drug trafficking from Monitor

Drug traffickers using mail carriers to deliver drugs during the holidays

MonitorDec 6, 2015
Drug traffickers using mail carriers to deliver drugs during the holidays …. to states such as Minnesota, Indiana, Pennsylvania, Georgia, Florida, …

Ringleader sentenced for holding disabled people captive in

fox8.comNov 6, 2015
… and medical care, and moved them between Pennsylvania, Texas, Virginia, … the captives were often isolated, in the dark, and sedated with drugs … violent crime in aid of racketeering, sex trafficking, kidnapping, theft of …

Report highlights the many ways drugs come into Houston

Chron.comJul 8, 2015
Drugs continue to move into the Houston by air, land and sea, and the region will remain a major drug trafficking corridor for the …. Texas on Thursday, and that it is the largest seizure of drug-cartel … Pennsylvania Gov.

Mexican Cartel Operation Discovered in Rural Pennsylvania …

http://www.breitbart.com/texas/…/mexican-cartel-operation-discovere…
Breitbart

Jun 4, 2014 – Mexican Cartel Operation Discovered in Rural Pennsylvania. … Hogan said, “Everybody knew that the Lemus’ [drug trafficking organization] … Sylvia Longmire, a Breitbart Texas contributing editor and border security expert, …

Oct 31, 2013 – Federal drug charges result from violations of the federal laws pertaining to … For drug trafficking and distribution, a sentence of three years is … Oregon, Pennsylvania, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, Washington, West Virginia, Wisconsin, Wyoming.

U.S. States Affected by Mexican Drug Trafficking … – CSG West

Drug Trafficking Organizations. Drug Trafficking. Arms Smuggling. Human Trafficking … follows I-70 and I-80 to New York, New York, and Philadelphia, Pennsylvania. … Corridor E follows I-25 north from El Paso, Texas to Billings, Montana.

DRUG-FREE ZONE LAWS: – The Sentencing Project

sentencingproject.org/…/sen_Drug-Free%20Zone%20…
Sentencing Project

Oregon. Pennsylvania. South Carolina. South Dakota. Tennessee. Texas. Utah. Virginia …. possession, and drug dealing—with the sentence for each offense …

Posted in Pennsylvania, The Underground Manuals, Underground Economy | Tagged: | Comments Off on Pa. Journals II 2016

Pa. Journals

Posted by Tespid on January 21, 2016

Enslaved by human trafficking | News | lancasteronline.com

lancasteronline.com/…trafficking/article_37f4bc7b-7a…
LNP Media Group

Jul 29, 2012 – Critics say Pennsylvania’s anti-trafficking laws are weak, leading to few prosecutions. … But a few decades ago, she points out, people didn’t believe drugs and … “It’s very underground.” … The case was the first of its kind in Pennsylvania’s Eastern District, which includes Lancaster County, Conway says.

WGAL

Nov 17, 2014 – It’s real: Human trafficking in Pennsylvania. At least 1 multi-million dollar ring has been shutdown in Lancaster County. UPDATED 6:32 PM EST …

WGAL

Mar 25, 2015 – Police: Mexican drug ring busted in Reading; $2.2M worth of drugs seized … were confiscated when police busted a drug smuggling operation Tuesday in Reading. … Tags Reading drug bust Mexico Berks County Lehigh County …. Lancaster, PA … Hearst Television LAKANA CNN Weather Underground.

Heroin Highway – Philadelphia City Paper

citypaper.net/articles/030598/cov.heroin.shtml

… and dope from Philadelphia to North Central Pennsylvania is clear and evident. … Lancaster County Drug Task-Force undercover detective James Blaine keeps … edifice of the Ephrata Public Comfort Station, an underground bathroom built in ….. The Amish have nothing to do with the heroin traffic, says Czabafy, yet more …

Pennsylvania Drug Threat Assessment – US Department of …

United States Department of Justice

drug trafficking organizations, local and statewide independent transporters, some mem- bers of street gangs, … primary drug threat in Pennsylvania because highly pure, low-cost heroin has led to ris- …… Williamsport and in Lancaster County.

Story image for underground drug trafficking lancaster county pennsylvania from WGAL Lancaster

Veteran York County officer facing federal corruption charges

WGAL LancasterDec 18, 2015
A 17-year veteran with the Fairview Township Police Department in York County has been arrested and faces federal corruption charges, …

North Dakota oil boom lures Mexico’s cartels

WGAL LancasterDec 14, 2015
(CNN) —The Mexican drug cartels have extended their reach into North Dakota, a federal law enforcement official told CNN.

A look inside Mexican drug lord’s prison escape – and how he did it

FOX43.comJul 13, 2015
A look inside Mexican drug lord’s prison escape – and how he did it … to a vertical passageway going more than 10 meters (33 feet) underground. … “In addition to his crimes in Mexico, he faces multiple drug trafficking and …. Man pleads guilty to threatening ex, fleeing from police in Lancaster County.

Sex traffickers are branding girls

WMUR ManchesterAug 24, 2015
Sex traffickers are branding girls … Drug dealers do the same thing to the baby mama’s that provide free room and board courtesy of the …
Story image for underground cocaine trafficking  lancaster county pennsylvania from WGAL Lancaster

Police: Man making pot-laced cereal now behind bars

WGAL LancasterOct 28, 2014
Two men are behind bars following an investigation into marijuana trafficking in Berks County. The men … BERKS COUNTY, Pa. —Two men …

Drug-laced fudge, Rice Krispies Treats and muffins seized at Pa

WGAL LancasterAug 11, 2015
The drug-laced desserts included: Fudge, chocolate, Rice Krispies Treats … a music festival held annually in Liberty Township, Tioga County.

Posted in Pennsylvania, Uncategorized, Underground Economy | Comments Off on Pa. Journals

Burger #2

Posted by Tespid on January 12, 2016

Untitled Burger #2

Bread
½ cup of water
½ cup of milk
2.5 Tablespoons of butter
2 Tablespoons of sugar
½ teaspoon salt
1 pkg of quick rising yeast
3 cups of flour
Place water, milk, butter in a pyrex cup and heat for 40 seconds in the microwave. Test temperature to hover between 110-115 degrees Fahrenheit. When temperature range in reached, add in yeast and stir. Proof the yeast by adding the sugar. When small clumps of active yeast rise to the top of the slurry, it is ready. Place flour and salt in a non-reactive bowl (no metal). Pour in liquid and stir till combined. Knead for 30 seconds and roll out into a ½” thick square. Cut four squares out and slice a shallow “X” on the top of each square. Let rise for an hour. Bake on 350 degrees Fahrenheit for 30-40 minutes.

Burger
1 pound of ground turkey
2 links of Johnsonville Farms chorizo, casing removed
1 teaspoon ground garlic
½ teaspoon ground cumin
¼ teaspoon ground coriander
1/8 cup of brown sugar
½ teaspoon ground cinnamon
2 slices of bacon (Fry after the burger patties are done and set aside for assembly)

Place all ingredients into a bowl and combine by hand until well blended. Fry in ½ cup portioned patties. The meat will be done when the patty has shrunk considerably and turned brown. Be aware that the patty will lose much water, but not juiciness in the final bite. So take care not to fry at to high of a temperature thus encasing raw meat. As an added precaution or flavor after pulling the meat, squeeze the juice of a fresh lemon over the patty.

Sauce
(makes 2 servings)
3 Ancho chilis
3 Arbol chilis
2 cups water
1 Tablespoon olive oil
4 Roma tomatoes
1 medium apple
2 Tablespoons of brown sugar
¼ teaspoon of salt
2 Tablespoons of granulated sugar

Remove the stem and deseed the chilis. Place them in a pyrex cup with water. Soften the skins by cooking in the microwave for 2-4 minutes. Let the chilis soak in the water for 5 minutes. Puree the chilis with ¼ cup of reserved liquid and olive oil. Add more water if necessary. Strain the liquid and reserve. Save the remaining chili meats in the refrigerator to add to another dish.

Remove the skin and puree the tomatoes with one apple (cored and skin removed). Place the puree in a pot with the reserved chili liquid, brown sugar and salt. Simmer to thicken for 10 minutes then finish off with the granulated sugar. Refrigerate until needed.

Fried onion rings
Use one medium onion and slice thin rounds through the complete onion. Either dust in flour then fry golden brown, or turn each round in a beaten egg, then dust with flour, salt, and pepper before frying. Set the onion stack aside for assembly.

Assembly
Toast the bread until light brown in a toaster or on the griddle after the burgers are cooked. On the bottom of the bun place a tablespoon or two of sauce. Then top with two or three rounds of onion rings, two patties, then shredded cheddar. Then two more patties, shredded cheddar, and 2 slices of bacon. Take the top of the bun and slather with French Onion Dip. Place on top. Place on a serving dish and slice in the sandwich in half. Serve with more sauce and the remaining onion rings. Pair with your choice of drinks, but I would recommend nothing too strong in flavor for it will deter from Burger #2 nuances. That night, I think I had mint tea cold without sugar.

Note: When I cook, I cook for one. What is left goes in the fridge for the ‘morrow. So you may find my proportions off. If you are cooking for more than one, double if not triple the sauce recipe as you need it. The bread and meat should provide for four servings, while you will need to increase your reserves for the bacon, sauce, and onion rings.

Also, for a twist, serve an open plate using all of the components. Slice an ounce of cheddar and make grilled onions for the pairing instead. Sauce, of course, on the side and increase the serving to two for one person.

On the way to other domestic adventures besides trying to swear off sugar until another baking season starts.

YF,

The pastied pastry cook

Posted in Cooking, Uncategorized, Writing | Tagged: | Comments Off on Burger #2

Sweet Skirt XI

Posted by Tespid on January 8, 2016

My street education for living out in a skirt has not flared up in months. I have matured more over the past year than in the past decade it seems. I am wanton of embracing a woman’s femininity instead brace behind a seat belt, giggling to tunes that might as well be playing for the Radio Disney station. Bottom Line? I am welcoming womanhood if not in a patient guise then that of a woman in waiting. So, there I go in a skirt – somewhat confident and ever hopeful of a man’s response. That response was persistent that week: doors being held open, gracious “Hellos”, and well placed “excuse me, I am sorry” responses. And yes, smiles. Mutual respect not withstanding, I found the graces of society abiding and abounding.

Yet, that was the glazed side of the donut. In the grocery store, it started with the flustered teenager feeling herself up as I walked past her to the sweet potatoes. It carried on as I picked the freshest bundle of cilantro I could find – a man darted in for lettuce and would not stop staring at me. By the time I headed into the parking lot to my car I realized people where trying to pick me up the whole time. Forgive me, and this is sarcasm, does anybody shop for things other than flesh these days? I was angry. Still am and the coy insults for not selling my self next to the bread on aisle three. Some woman had that post taken already. She was in a skirt as well and I could never have presented my shelf so well. I should keep track of my notes as to pick up times at Wal-Mart. The fragrance of desperation is more pungent some days than others. So, on the way to the car, I was pushing the cart uphill and my boots traction started to slip. The young men keeping quick pace with me finally turned off to their vehicle and cursed something at me as I pushed on. He said “If you are going to dress like that, you better f%$k us or in the least wear something else.” I pushed on to my vehicle dumbfounded. The skirt flares down to  my ankle and is of heavy weight material. The skirt comes down so far that it brushes over the top of my cowboy boots. I also was wearing a black wool jacket.

Putting the 2014 Slut Walk aside I’ve got to wonder how I reeled that guy’s interest in. I think 19th century sex conventions aside my wrists and earlobes were bare. I do not think that was it. So, how do I figure this as sex dress code? What other signals am I missing? Forgive my ignorance but if this is going to impede regular shopping, I have got to know what I am dealing with. Namely, I’ll be starting with the position that I will wear a skirt if I damn well please. I refuse cater to a convention that sexualizes everything in one form or another. As for confirmed pick up joints, this one I can not avoid. Honestly, I do not want to learn the language. I figure if a man would like to get to me, he will prompt conversation directly and not be coy or particular. In the beginning somethings are just understood, logically presumed even.

NCC

Posted in Uncategorized, Writing | Tagged: , | Comments Off on Sweet Skirt XI

Cooking

Posted by Tespid on December 24, 2015

Fickle
This beginning of a recipe is an unsolved riddle. The remaining notes are no wear to be found in the kitchen or my logs. For a creative bent to solve, I have provided ingredients as well as the problems in creating my concept of a sweet hot snack that crunches. Here I give you have the opportunity to try blending for yourself. Note: The investment in ingredients is high, but you’ll have enough for a several month supply. I also warn you, do not eat your supplies. If you do, they will disappear long before you make the combination of elements.

Tools:
Wooden spoons
One large ceramic or wooden
Wax Paper
One double boiler
Plastic Gloves

Ingredients:
Hot Wasabi Peas
Dried Fruit (Try banana chips, apple chips, or dried apricots – roughly chopped)
Dark Chocolate M&Ms
Granola
Unsalted Peanuts
Almonds, roughly chopped
Chex Cereal – Rice or Corn
Peanut Butter filled Pretzels – (H.K. Anderson’s)
Sweet Potato Chips or (Yam, Plantain, or Corn Tortillas thinly sliced and fried in corn oil till crisp.)
English Butter Toffee (homemade or store bought broken into small pieces in a plastic bag wrapped with a dish towel hit with a mallet.
Sea Salt
Mexican Chili Powder
One cup of Dark Chocolate Chips melted in a double boiler with an ounce or two of paraffin wax.

Directions:
Spread one to two feet of wax paper on a counter top. Anchor the paper so it will not curl over the snack as it dries. Combine all the ingredients from 1-10 in a large bowl. Drizzle the chocolate over top and turn the combine with gloves on to coat. Sprinkle ½ teaspoon of sea salt and ½ teaspoon chili powder over the combine for a final turn. Spread the combine over the wax paper and let it dry for an hour or more. At least until the chocolate dries. Package in plastic bags and keep refrigerated.

Clue: ½ cup measurements work well to start.

Curling up with warm dark chocolate peanut butter cookies. O.K. I’ll share. SIKE!

I did the dishes, dried and put them away. You, however, should go to bed.

YF,

The Pastied Pastry Cook.

Posted in Cooking, Uncategorized, Writing | Tagged: | Comments Off on Cooking

Cooking W.H. 11

Posted by Tespid on December 23, 2015

W.H. 11
Breakfast/Brunch Menu and Recipes

Black Tea served hot
Mint Tea served hot
Chicory spiked coffee or a blend with dark roasted grounds (see Chock Full o’ Nuts)
Cream
Milk
Sugar
Ice Water
Tortillas
Salsa
Bacon
Chorizo Sausage (Two per person)
Fried Eggs, Once over lightly (Two per person)
Fried Apples
Beans
Blackened Corn
Potato en Pastry (Working title)
Banana Pancakes IV (Three per person)
Fried Apples
Heat a cast iron skillet with one tablespoon of butter. Meanwhile, after coring, slice one small apple per person into wedges. Place the apples into the hot skillet to brown on one side. Add a tablespoon or two of water per apple. Cover and cook down till soft. Lightly dust with powdered ginger and two tablespoon of sugar. Stir. Cover again and cook for a few more minutes. Take care not to let the apples burn and the sugar caramelize into smoke. Pair the apples with the banana pancakes to serve.

Beans
Rinse beans and place in a pot. Cover with two inches of water. Add in the dry ingredients of one tablespoon of Mint, 1 teaspoon of cilantro and one teaspoon of oregano. Turn on medium heat until it the beans boil, then lower heat to begin the slow cook. Stir occasionally. When they begin to get soft after one to two hours, mash them. Next, add one medium onion, three chopped cloves of garlic, one teaspoon of salt, and 1/2 teaspoon of cumin. Stir and cook off water until the beans thicken to the consistency of raw honey.

Blackened Corn
Two ears of corn shucked and rinsed. Scrape the kernels from the cob and reserve to the side.
If fresh corn is not available, use two cans of yellow corn. Pour off the preserving liquid, rinse with warm water, drain and set aside.
1 small onion finely chopped
2 cloves of garlic finely chopped
1-2 Tablespoon of unsalted butter
1-2 Tablespoons of Olive Oil
3-5 springs of fresh Italian Oregano. Rinse and gentle separate the leaves from the stem. Place in a ceramic bowl.
3-8 large leaves of fresh Genovese Basil. Rinse and chop fine. Place in the ceramic bowl with the oregano.
Sea salt
Fresh Crack Pepper
Juice of one large lemon
In a cast iron skillet melt the butter and heat the olive oil together. When hot, stir in the garlic. After a few turns with the wooden spoon add the corn. Toss in the oil mixture and stir every few minutes. Aim to tan or brown the kernels. Do not let them sit so long that they burn. So keep a close eye on the mixture. Once well browned on several sides add in the onion and stir to distribute well. Transfer the corn into the ceramic bowl. Add in the lemon juice. Stir. Season the puree to taste with sea salt and fresh cracked pepper. Serve. To keep things quick and simple, omit the garlic and onion completely, or toss them in with the corn during the final seasoning.

Potato en Pastry
Yield: 4-10
Serving: 1-2
Oil Dressing

(I have not tried the pastry yet by brushing with this oil blend. After Christmas Day proper, I will be collecting the ingredients. Creating a dressing gives the potato flavor another ingredient to meld with or play down. Even without the blend, the pastries sat hardy and welcome in my palette and being.)
In a small bowl, place the pureed pulp from two Poblano peppers. (Char the skins off the peppers and scrape the remaining black from the body of the pepper. Place the remaining whole in a pan with two cups of water. Boil until soft then puree with the remaining water.) Add the bowl the puree of three seeded jalapenos. Also, add in ¼ teaspoon of cumin, ½ teaspoon of thyme, ½ teaspoon or oregano, ½ teaspoon of sea salt. Thin the mixture with ¼ of olive oil. Blend well and set aside.

Filling
1 medium potato
2 small turnips
½ medium carrot
1 small onion
4 cloves of garlic

Chop rough and small all the vegetables. Place in a pan with two cups of water. Boil until soft. Drain. Puree. Add in small amounts water and olive oil to smooth out the texture. Place the puree in a bowl with ¾ cup of cheddar or Mexican Farmer’s Cheese, ½ teaspoon of salt, ½ teaspoon of pepper, and juice of half a small lemon. Blend and correct the seasoning as needed. Set aside. (Note: The flavor of the filling will understate the oil dressing not compete with it.) In a separate pan, heat oil to a deep frying temperature.

While the vegetables are boiling, make two piecrusts from scratch. Courtesy of Betty Crocker:

2 cups flour (plain)
1 teaspoon of salt
2/3 cup + 2 Tablespoons shortening or 2/3 of lard
4-5 Tablespoons of cold water

Cut the shortening into the flour and salt. Then add water one tablespoon at a time. When the dough holds a soft ball, knead briefly, then rollout onto a clean, floured surface. Using a large biscuit cutter make 18-20 circles. Pair the circles or work with less filling to make halves. Take a pastry brush and run the dough circle rim lightly with cold water. Place one tablespoon of filling in the middle of a circle. Top with another circle and seal the edges by pressing them with a fork. Carefully lift the pie and place into the hot frying oil. Watch with a careful eye to fry until golden brown on both sides. Set aside on a paper towel to drain. Brush with the dressing mixture and set aside to serve with a small side of sour cream.
Banana Pancakes IV
Yield: 12-20 pancakes

2 Bananas, pureed
2 Tablespoons Corn Oil
2 Large Eggs separated into yolks and whites. Beat egg whites into stiff peaks and set aside.
Juice of one lemon
1 Tablespoon of freshly grated Ginger
1 teaspoon Cardamom
¼ teaspoon Mace
1/4 teaspoon ground cloves

1 cup all purpose Flour
2 Tablespoons granulated Sugar
1 teaspoon Baking Powder
1 teaspoon Baking Soda
1 teaspoon salt
½ – 1 cup Heavy Whipping Cream

Heat a griddle on the stovetop on low heat. Blend butter, yolks, bananas, and spices in a nonreactive bowl. Set aside. Sift flour, sugar, baking powder, baking soda, and salt into a dish. Set aside. Alternate adding cream and flour into the banana mixture. Start the process by using cream. Add lemon juice. Fold in egg whites.
Using a ¼ measure, place a dollop of batter onto the hot griddle. Brown on each side. Layer three with butter on a serving plate. Serve with syrup.

Evermore poised by the cook top with wrinkly fingers, bare feet, and toes,

YF,

The Pastied Pastry Cook

Posted in Cooking, Uncategorized, Writing | Tagged: | Comments Off on Cooking W.H. 11

 
Follow

Get every new post delivered to your Inbox.

%d bloggers like this: